이 사이트를 이용함으로써, 당신은 다음에 동의합니다 개인 정보 보호 정책.
수용하다
엔터인IT엔터인IT엔터인IT
  • 집
  • IT 프로
  • TECH
  • MICROSOFT
    • 하늘빛
    • 구성 관리자/SCCM
    • DPM
    • 오케스트레이터
    • Hyper-V
    • 마이크로소프트 엣지 인사이더
    • MSI
    • 사무실 365
    • 사무실 내부자
    • 파워 BI
    • 스카이프
    • SQL 서버
    • Teams
  • WINDOWS
    • Windows 관리 센터
    • 윈도우 클라이언트
    • 윈도우 서버
  • SCCM 쿼리 컬렉션 목록
독서: Java MSI X64 및 X86을 다운로드하십시오 8.0.1410.15
글꼴 크기 조정기아아
엔터인IT엔터인IT
글꼴 크기 조정기아아
  • 집
  • IT 프로
  • TECH
  • MICROSOFT
  • WINDOWS
  • SCCM 쿼리 컬렉션 목록
Search
  • 집
  • IT 프로
  • TECH
  • MICROSOFT
    • 하늘빛
    • 구성 관리자/SCCM
    • DPM
    • 오케스트레이터
    • Hyper-V
    • 마이크로소프트 엣지 인사이더
    • MSI
    • 사무실 365
    • 사무실 내부자
    • 파워 BI
    • 스카이프
    • SQL 서버
    • Teams
  • WINDOWS
    • Windows 관리 센터
    • 윈도우 클라이언트
    • 윈도우 서버
  • SCCM 쿼리 컬렉션 목록
MSI

Java MSI X64 및 X86을 다운로드하십시오 8.0.1410.15

Published: 2월 11, 2024
6 최소 읽기
공유하다

Java MSI X64 및 X86을 다운로드하십시오 8.0.1410.15.

내용물
New FeaturesChanges

For installation with Configuration Manager use:

x86

msiexec.exe /i “jre1.8.0_141.msi” /qn JU=0 JAVAUPDATE=0 AUTOUPDATECHECK=0 RebootYesNo=No
파워셸

x64

msiexec.exe /i “jre1.8.0_14164.msi” /qn JU=0 JAVAUPDATE=0 AUTOUPDATECHECK=0 RebootYesNo=No
파워셸

For uninstall use:

msiexec /x {<msi ID> (example 26A24AE4-039D-4CA4-87B4-2F64180131F0)} /qn /norestart
파워셸

New Features

security-libs/java.security

Disable SHA-1 TLS Server Certificates
Any TLS server certificate chain containing an SHA-1 certificate (end-entity or intermediate CA) anchored by a root CA certificate included by default in Oracle’s JDK is now blocked by default. TLS Server certificate chains that are anchored by the enterprise or private CAs are not affected. Only X.509 certificate chains that are validated by the PKIX implementation of the CertPathValidator 그리고 CertPathBuilder APIs and the SunX509 그리고 PKIX implementations of the TrustManagerFactory API are subject to the restrictions. Third-party implementations of these APIs are directly responsible for enforcing their own restrictions.To implement this restriction and provide more flexibility for configuring your own restrictions, additional features have been added to the jdk.certpath.disabledAlgorithms 그리고 jdk.jar.disabledAlgorithms Security Properties in the java.security file, as follows:

  • jdk.certpath.disabledAlgorithms:Three new constraints have been added to this Security Property:A new constraint named jdkCA, that when set, restricts the algorithm if it is used in a certificate chain that is anchored by a trust anchor that is pre-installed in the JDK cacerts keystore. This condition does not apply to certificate chains that are anchored by other certificates, including those that are subsequently added to the cacerts keystore. 또한, note that the restriction does not apply to trust anchor certificates, since they are directly trusted.A new constraint named denyAfter, that when set, restricts the algorithm if it is used in a certificate chain after the specified date. The restriction does not apply to trust anchor certificates, since they are directly trusted. 또한, code signing certificate chains as used in signed JARs are treated specially as follows:
    • if the certificate chain is used with a signed JAR that is not timestamped, it will be restricted after the specified date
    • if the certificate chain is used with a signed JAR that is timestamped, it will not be restricted if it is timestamped before the specified date. If the JAR is timestamped after the specified date, it will be restricted.
    A new constraint named usage, that when set, restricts the algorithm if it is used in a certificate chain for the specified use(s). Three usages are initially supported: TLSServer for TLS/SSL server certificate chains, TLSClient for TLS/SSL client certificate chains, 그리고 SignedJAR for certificate chains used with signed JARs.

Multiple constraints can be combined to constrain an algorithm when delimited by ‘&'. For example, to disable SHA-1 TLS Server certificate chains that are anchored by pre-installed root CAs, the constraint is “SHA1 jdkCA & usage TLSServer”.

  • jdk.jar.disabledAlgorithms:A new constraint has been added named denyAfter, that when set, restricts the algorithm if it is used in a signed JAR after the specified date, as follows:
    • if the JAR is not timestamped, it will be restricted (treated as unsigned) after the specified date
    • if the JAR is timestamped, it will not be restricted if it is timestamped before the specified date. If the JAR is timestamped after the specified date, it will be restricted.
    For example, to restrict SHA1 in JAR files signed after January 1st 2018, add the following to the property: “SHA1 denyAfter 2018-01-01”. The syntax is the same as the certpath property, however certificate checking will not be performed by this property.

Changes

core-svc/java.lang.management

JMX Diagnostic improvements
com.sun.management.HotSpotDiagnostic::dumpHeap API is modified to throw IllegalArgumentException if the supplied file name does not end with “.hprof” suffix. Existing applications which do not provide a file name ending with the “.hprof” extension will fail with IllegalArgumentException. In that case, applications can either choose to handle the exception or restore old behavior by setting system property ‘jdk.management.heapdump.allowAnyFileSuffix’ to true.

Custom HostnameVerifier enables SNI extension
Earlier releases of JDK 8 Updates didn’t always send the Server Name Indication (SNI) extension in the TLS ClientHello phase if a custom hostname verifier was used. This verifier is set via the setHostnameVerifier(HostnameVerifier v) method in HttpsURLConnection. The fix ensures the Server Name is now sent in the ClientHello body.

Tighter secure checks on processing WSDL files by wsimport tool
The wsimport tool has been changed to disallow DTDs in Web Service descriptions, specifically:

  • DOCTYPE declaration is disallowed in documents
  • External general entities are not included by default
  • External parameter entities are not included by default
  • External DTDs are completely ignored

To restore the previous behavior:

  • Set the System property com.sun.xml.internal.ws.disableXmlSecurity to true
  • Use the wsimport tool command line option –disableXmlSecurity
    메모: JDK 7 and JDK 6 support for this option in wsimport will be provided via a Patch release post-July CPU

DOWNLOAD x86

DOWNLOAD x64

태그됨:JavaMSI시스템 센터시스템 센터 구성 관리자기술 미리보기WindowsWindows 10
이전 기사 구성 관리자 쿼리 컬렉션 목록 SCCM Technical Preview Branch Update 1705
다음 기사 마스터 .net 프레임 워크 3.5 구성 관리자 배포
코멘트를 남겨주세요 코멘트를 남겨주세요

답장을 남겨주세요 답장 취소

귀하의 이메일 주소는 공개되지 않습니다. 필수 입력란이 표시되어 있습니다 *

이 사이트는 스팸을 줄이기 위해 Akismet을 사용합니다.. 댓글 데이터가 처리되는 방법 알아보기.

번역

English中文(简体)DanskNederlandsFrançaisDeutschItaliano한국어PolskiPortuguêsRomânăEspañolУкраїнська
~에 의해 Transposh - translation plugin for wordpress

인기 게시물

Windows Server의 시스템 요구 사항 2016
윈도우 서버
구성 관리자 쿼리 컬렉션 목록
구성 관리자 쿼리 컬렉션 목록
ConfigMgr
클래식 팀 사이트의 최신 페이지에서 구조적/관리형 탐색 활성화
Tech
SCCM이 DP 위치를 MP에서 예상 버전으로 가져오지 못했습니다.
ConfigMgr

최근 게시물

Ubuntu에서 SSH 보호를 위한 Fail2ban 설치 및 구성 24.04
리눅스
AlmaLinux에서 FirewallD 활성화 및 구성
리눅스
AlmaLinux에서 사용자 생성 및 SSH 키 설정
리눅스
AlmaLinux에서 비밀번호를 재설정하는 방법
리눅스

© 2023 엔터인IT

모바일 버전으로 이동하십시오
돌아온 것을 환영합니다!

귀하의 계정에 로그인하세요

사용자 이름 또는 이메일 주소
Password

비밀번호를 잃어버렸습니다?